-
1
-
-
0029719644
-
The space complexity of approximating the frequency moments
-
N. Alon, Y. Matias, and M. Szegedy. The space complexity of approximating the frequency moments, STOC, 1996.
-
(1996)
STOC
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
2
-
-
27544439829
-
Estimating the relative size and overlap of public web search engines
-
K. Bharat and A. Broder. Estimating the relative size and overlap of public web search engines, WWW, 1998.
-
(1998)
WWW
-
-
Bharat, K.1
Broder, A.2
-
3
-
-
4243152206
-
Reducing the servers computation in private information retrieval: PIR with preprocessing
-
A. Beimel, Y. Ishai, T. Malkin. Reducing the servers computation in private information retrieval: PIR with preprocessing, CRYPTO, 2000.
-
(2000)
CRYPTO
-
-
Beimel, A.1
Ishai, Y.2
Malkin, T.3
-
5
-
-
0003700684
-
One-round secure computation and secure autonomous mobile agents
-
C. Cachin, J. Camenisch, J. Kilian and J. Müller. One-round secure computation and secure autonomous mobile agents, ICALP, 2000.
-
(2000)
ICALP
-
-
Cachin, C.1
Camenisch, J.2
Kilian, J.3
Müller, J.4
-
6
-
-
0001090406
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali and M. Stadler. Computationally private information retrieval with polylogarithmic communication, Eurocrypt, 1999.
-
(1999)
Eurocrypt
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
7
-
-
0038721038
-
Universally composable twoparty computation
-
R. Canetti, Y. Lindeil, R. Ostrovsky, and A. Sahai, Universally composable twoparty computation, STOC, 2002.
-
(2002)
STOC
-
-
Canetti, R.1
Lindeil, Y.2
Ostrovsky, R.3
Sahai, A.4
-
8
-
-
0003701129
-
Private information retrieval by keywords
-
Department of Computer Science, Technion
-
B. Chor, N. Gilboa and M. Naor, Private information retrieval by keywords, Technical Report CS0917, Department of Computer Science, Technion, 1997.
-
(1997)
Technical Report
, vol.CS0917
-
-
Chor, B.1
Gilboa, N.2
Naor, M.3
-
12
-
-
0003241823
-
Secure multiparty computation of approximations
-
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. Wright. Secure multiparty computation of approximations, ICALP 2001.
-
ICALP 2001
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.6
-
14
-
-
26444451487
-
On secure scalar product computation for privacy-preserving data mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen. On secure scalar product computation for privacy-preserving data mining, ICISC, 2004.
-
(2004)
ICISC
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
15
-
-
33745533362
-
Construction of a pseudorandom generator from any one-way function
-
International Computer Science Institute
-
J. Hastad, R. Impagliazzo, L. A. Levin, and M. Luby. Construction of a pseudorandom generator from any one-way function, Technical Report TR-91-068, International Computer Science Institute, 1991.
-
(1991)
Technical Report
, vol.TR-91-068
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.A.3
Luby, M.4
-
16
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz and T. Malkin, Protecting data privacy in private information retrieval schemes, STOC, 1998.
-
(1998)
STOC
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
21
-
-
0024770898
-
One-way functions are essential for complexity-based cryptography
-
R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography, FOCS, 1989.
-
(1989)
FOCS
-
-
Impagliazzo, R.1
Luby, M.2
-
23
-
-
0031644241
-
Approximate nearest neighbors: Towards removing the curse of dimensionality
-
P. Indyk and R. Motwani. Approximate nearest neighbors: towards removing the curse of dimensionality, STOC, 1998.
-
(1998)
STOC
-
-
Indyk, P.1
Motwani, R.2
-
24
-
-
33745541831
-
Polylogarithmic private approximations and efficient matching
-
P. Indyk and D. Woodruff. Polylogarithmic private approximations and efficient matching, ECCC, Technical Report TR05-117, 2005.
-
(2005)
ECCC, Technical Report
, vol.TR05-117
-
-
Indyk, P.1
Woodruff, D.2
-
25
-
-
0031636499
-
Efficient search for approximate nearest neighbor in high dimensional spaces
-
E. Kushilevitz, R. Ostrovsky and Y. Rabani. Efficient search for approximate nearest neighbor in high dimensional spaces, STOC, 1998.
-
(1998)
STOC
-
-
Kushilevitz, E.1
Ostrovsky, R.2
Rabani, Y.3
-
26
-
-
0003625004
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas. Privacy preserving data mining, Crypto, 2000.
-
(2000)
Crypto
-
-
Lindell, Y.1
Pinkas, B.2
-
27
-
-
0003270948
-
Asymptotic theory of finite dimensional normed spaces
-
Springer Verlag
-
V.D. Milman and G. Schechtman. Asymptotic Theory of Finite Dimensional Normed Spaces. Lecture Notes in Mathematics, 1200, Springer Verlag, 1986
-
(1986)
Lecture Notes in Mathematics
, vol.1200
-
-
Milman, V.D.1
Schechtman, G.2
-
29
-
-
33745578428
-
Communication complexity and secure function evaluation
-
M. Naor and K. Nissim. Communication complexity and secure function evaluation, STOC, 2001.
-
(2001)
STOC
-
-
Naor, M.1
Nissim, K.2
-
30
-
-
0003147279
-
Oblivious transfer and polynomial evaluation
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation, STOC, 1999.
-
(1999)
STOC
-
-
Naor, M.1
Pinkas, B.2
-
31
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes, Eucrocrypt, 1999.
-
(1999)
Eucrocrypt
-
-
Paillier, P.1
-
32
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Aiken Computation Lab
-
M. Rabin. How to exchange secrets by oblivious transfer. Technical report TR81, Aiken Computation Lab, 1981.
-
(1981)
Technical Report
, vol.TR81
-
-
Rabin, M.1
-
33
-
-
0020312165
-
Protocols for secure computations
-
A, C. Yao. Protocols for secure computations, FOCS, 1982.
-
(1982)
FOCS
-
-
Yao, A.C.1
|